Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: 138b9d940612d09b66fdc19937994306670e8f98e82d900eee890b94e031f222

Tx prefix hash: ca5b20d8ffc3f7da50e351df8a49b0c8cbc06f6fff595065b0a659f8016484d9
Tx public key: d0cfd17767475f64a1230807fdeb4a3f8cd26059b69443669c1dd5a00fb57688
Payment id: d7285be993884d2f9ed91267e948a35ff40e925634f44e34a9bdd26a997b390e
Timestamp: 1474781619 Timestamp [UCT]: 2016-09-25 05:33:39 Age [y:d:h:m:s]: 07:261:15:13:50
Block: 1143426 Fee (per_kB): 0.010000000000 (0.010905218317) Tx size: 0.9170 kB
Tx version: 1 No of confirmations: 2025778 RingCT/type: no
Extra: 022100d7285be993884d2f9ed91267e948a35ff40e925634f44e34a9bdd26a997b390e01d0cfd17767475f64a1230807fdeb4a3f8cd26059b69443669c1dd5a00fb57688

3 output(s) for total of 1.190000000000 xmr

stealth address amount amount idx
00: 8e36df8ab2b426f2d663267c04560793eebd611ba69bee8c734e0f3fd8d93801 0.090000000000 258829 of 317822
01: ab1b1829cda6807fec98798f6433361cba3d25fa9fe3aead5ed91a0633914f23 0.100000000000 920956 of 982315
02: 1f0d5015acce448338237355416ce4273a2a76233b2311d6fd0b7b3e5fda53a2 1.000000000000 803641 of 874629

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-15 03:20:02 till 2016-09-25 00:37:59; resolution: 4.90 days)

  • |_*___________*_________________*____*____________________________________________________________________________________________________________________________________*|
  • |____________________________*____________*___*________________________________________________________________________________________________________*__________________*|

2 inputs(s) for total of 1.200000000000 xmr

key image 00: 1c7d1a626e21dd32a2373e36f739719e0aabc6cc2c26cbd146e9eb05e43ab583 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b99b0f6a21dfe84d6b0aabef3ba883a27579183ad0c6932ec10799fdeff28b2e 00085925 1 7/12 2014-06-15 04:20:02 09:364:16:27:27
- 01: 7522c1f02739bfaffd4887eeda33b1db3af037b9f523ab8c208a76be60ddb477 00176230 2 5/81 2014-08-16 19:34:28 09:302:01:13:01
- 02: 40b347cb721ff2f4c93587da1341ad5ebf59837b96a9bb18a926b0929419aa6e 00299656 1 12/52 2014-11-11 02:22:55 09:215:18:24:34
- 03: eff48170c6f8dffbd8c4ee6146bd01689222678868444dd4345ff014d0ec6308 00338536 1 5/57 2014-12-08 06:46:07 09:188:14:01:22
- 04: ea947f46260ee3cc570a90043f1001330d734f72cea9fcf229a600219a2d8a62 01143266 3 35/76 2016-09-24 23:37:59 07:261:21:09:30
key image 01: 51bb87bfe3b795b5009f99f621f5ad3f4167b42c377c689195deceff534bc319 amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a8e249d9dd30c2fa5bd474d3a857eb1bc6bf0d14dce1a7ecab5e38eb2c5da581 00277601 2 2/21 2014-10-26 13:18:04 09:231:07:29:25
- 01: 4f740e089059677497880f008b40afda04d5d1209fb946e3a35365f0f57542dd 00374468 1 37/96 2015-01-02 11:19:40 09:163:09:27:49
- 02: ce0fc2d4da98b91f1f69b45f947e167205e31e6fd49a6a7d04aab2ad38786396 00402174 2 17/33 2015-01-21 22:59:56 09:143:21:47:33
- 03: 139f42a82eef37a4ac2a385a80bcf5b6e4ff03b9f0966c9de4c42b21d9bc434c 01074752 4 3/10 2016-06-21 22:59:27 07:356:21:48:02
- 04: 5db808f7bac238a36bd6acd2496cdc0768d53e85cee418daf7cf87515742af09 01143266 3 35/76 2016-09-24 23:37:59 07:261:21:09:30
More details | Tx as hex | Ring member outputs/mixins as hex | Full ring member txs as hex
source code | explorer version (api): master-2024-03-08-9050231 (1.2) | monero version: 0.18.3.2-release